From owner-freebsd-security@freebsd.org Tue Nov 27 21:22:10 2018 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3C66F113934B for ; Tue, 27 Nov 2018 21:22:10 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [96.47.72.132]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id D7E886E2E5; Tue, 27 Nov 2018 21:22:09 +0000 (UTC) (envelope-from security-advisories@freebsd.org) Received: by freefall.freebsd.org (Postfix, from userid 945) id B474B1A812; Tue, 27 Nov 2018 21:22:09 +0000 (UTC) From: FreeBSD Security Advisories To: FreeBSD Security Advisories Subject: FreeBSD Security Advisory FreeBSD-SA-18:13.nfs Reply-To: freebsd-security@freebsd.org Precedence: bulk Message-Id: <20181127212209.B474B1A812@freefall.freebsd.org> Date: Tue, 27 Nov 2018 21:22:09 +0000 (UTC) X-Rspamd-Queue-Id: D7E886E2E5 X-Spamd-Result: default: False [2.69 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_SPAM_LONG(0.91)[0.910,0]; NEURAL_SPAM_MEDIUM(0.91)[0.912,0]; ASN(0.00)[asn:11403, ipnet:96.47.64.0/20, country:US]; NEURAL_SPAM_SHORT(0.87)[0.865,0] X-Rspamd-Server: mx1.freebsd.org X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.29 List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Nov 2018 21:22:10 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-SA-18:13.nfs Security Advisory The FreeBSD Project Topic: Multiple vulnerabilities in NFS server code Category: core Module: nfs Announced: 2018-11-27 Credits: Jakub Jirasek, Secunia Research at Flexera Affects: All supported versions of FreeBSD. Corrected: 2018-11-23 20:41:54 UTC (stable/11, 11.2-STABLE) 2018-11-27 19:42:16 UTC (releng/11.2, 11.2-RELEASE-p5) CVE Name: CVE-2018-17157, CVE-2018-17158, CVE-2018-17159 For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit . I. Background The Network File System (NFS) allows a host to export some or all of its file systems so that other hosts can access them over the network and mount them as if they were local. FreeBSD includes both server and client implementations of NFS. II. Problem Description Insufficient and improper checking in the NFS server code could cause a denial of service or possibly remote code execution via a specially crafted network packet. III. Impact A remote attacker could cause the NFS server to crash, resulting in a denial of service, or possibly execute arbitrary code on the server. IV. Workaround No workaround is available, but systems that do not provide NFS services are not vulnerable. Additionally, it is highly recommended the NFS service port (default port number 2049) is protected via a host or network based firewall to prevent arbitrary, untrusted clients from being able to connect. V. Solution Perform one of the following: 1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. Afterward, reboot the system. 2) To update your vulnerable system via a binary patch: Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility: # freebsd-update fetch # freebsd-update install Afterward, reboot the system. 3) To update your vulnerable system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility. [FreeBSD 11.2] # fetch https://security.FreeBSD.org/patches/SA-18:13/nfs.patch # fetch https://security.FreeBSD.org/patches/SA-18:13/nfs.patch.asc # gpg --verify nfs.patch.asc b) Apply the patch. Execute the following commands as root: # cd /usr/src # patch < /path/to/patch c) Recompile your kernel as described in and reboot the system. VI. Correction details The following list contains the correction revision numbers for each affected branch. Branch/path Revision - ------------------------------------------------------------------------- stable/11/ r340854 releng/11.2/ r341088 - ------------------------------------------------------------------------- To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed: # svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base Or visit the following URL, replacing NNNNNN with the revision number: VII. References The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEE/A6HiuWv54gCjWNV05eS9J6n5cIFAlv9n85fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEZD MEU4NzhBRTVBRkU3ODgwMjhENjM1NUQzOTc5MkY0OUVBN0U1QzIACgkQ05eS9J6n 5cKJEg//Umbe1QOUgV0Z6EsdlQffNMo9MHbAz75vCqeaibI36Ng9vmkLKGlS6nCA 5mKFS+BvM5CkekBaiQ6BR8t0xWsrFwX6JCUayQ2FsCSo4rwCZms3AIbvt68vjQAm xWuQIMJzYku5+kALtcXXvVkLhMCaioVDpZmuPCO+rY79OVM4xP1MsnTfqEZSNo+n Cz2urH4eO60YsM8w05coQ3hnOsUjTCk8yCh3+R/uYK1VouLDgD8q96T1eG2ozny6 vwEMK3AjmcpvFkTIF3/2I6TTA5K+Zd+nqzhzPM5HjbLZmdQV02NHcoGaZrK1wsQw D+3wf8icBMfLt9rTUbEqVdvg5FRDkTo8/dH1wY85gWZ2wsSgCqI2wRuqBH4bp3bb Gcf2+D4vgX6YY5cZ/wFDcYWpghhrmXUbgnH7PnyVfYB0Ufta9utgMOQKMS0mUWwM DlHP+fL/A8lhPvXIhl1DtSa/TQAiAdMG1JwktzThKrUzjL8bntmjoqtr1Xcp2txJ hgALulqz9nzkHaHcEolgk5xFTvx4gCzhjII7XEU3/rLNPPlJK3Pfo0UvPLAUkdLj McnKqOyQ6uSl8/lNuVsd3JCZ3dlsES7VmdEu0YJ4goc/6/AB8KXnSqzheT7Cjn1p lGzbFYmXosUj9NEQl/SOg6O8LnRrJIw4Tbm9vfkDss1G+sjUdaA= =m/Lh -----END PGP SIGNATURE----- From owner-freebsd-security@freebsd.org Fri Nov 30 13:41:20 2018 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 4B58B1144697 for ; Fri, 30 Nov 2018 13:41:20 +0000 (UTC) (envelope-from rick.chisholm@hubinternational.com) Received: from us-smtp-delivery-103.mimecast.com (us-smtp-delivery-103.mimecast.com [63.128.21.103]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client CN "*.mimecast.com", Issuer "DigiCert Global CA G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 009B882B9A for ; Fri, 30 Nov 2018 13:41:18 +0000 (UTC) (envelope-from rick.chisholm@hubinternational.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hubinternational.com; s=hubinternational20170913; t=1543585272; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding:in-reply-to: references; bh=hF+RYyiDPuPsfrDuQgpp7WbLB8BRvTd9xA7hFvTlh9Q=; b=VbY6lLBeJdcuW8xIRPweubPaSMw831+fzeA5Dqkk9SOXqNJlGLe70Wwn7EIGV9B99EjcqjCjYbdro7ndMZ83/5e3AWGTsk1G0TPWPn2fo7IEk5kdK8orfZr7Wx/PAQEJ/rK9iT4ZCs2bl2hZf+BZFQL2K/Wl++pzYCvtUXgqL0ClU02D43BBQ6FuJux3233f+Qph3KhY2G94r5AdbP391Wfgig+rJ2d4T1ZAzn1tgq9ssINDRXotkgL4u0JFayM8u95Cd+BddB/loN4sdxQZfOHvbiGUPVG99ja1qBMUcJoTqdK+8zwCMGVaRhBn8KgDifoEjXD520vsvM/zUjz8tA== Received: from NAM05-DM3-obe.outbound.protection.outlook.com (mail-dm3nam05lp2058.outbound.protection.outlook.com [104.47.49.58]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-2-AMSrFIIfMxq7MFielJmeEg-1; Fri, 30 Nov 2018 08:41:07 -0500 Received: from BN7PR06CA0043.namprd06.prod.outlook.com (2603:10b6:408:34::20) by CY4PR0601MB3745.namprd06.prod.outlook.com (2603:10b6:910:92::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1361.20; Fri, 30 Nov 2018 13:41:05 +0000 Received: from BL2NAM02FT046.eop-nam02.prod.protection.outlook.com (2a01:111:f400:7e46::205) by BN7PR06CA0043.outlook.office365.com (2603:10b6:408:34::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1382.18 via Frontend Transport; Fri, 30 Nov 2018 13:41:05 +0000 Received: from EDCV-XHG-MCP01.hub.local (64.14.237.30) by BL2NAM02FT046.mail.protection.outlook.com (10.152.76.118) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1382.18 via Frontend Transport; Fri, 30 Nov 2018 13:41:04 +0000 Received: from EDCV-XHG-MCP01.hub.local (10.130.29.195) by EDCV-XHG-MCP01.hub.local (10.130.29.195) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Fri, 30 Nov 2018 07:40:59 -0600 Received: from EDCP-XHG-HCP02.hub.local (10.130.30.61) by EDCV-XHG-MCP01.hub.local (10.130.29.195) with Microsoft SMTP Server (TLS) id 15.0.1395.4 via Frontend Transport; Fri, 30 Nov 2018 07:40:59 -0600 Received: from EDCV-XHG-TNP01.hub.local ([fe80::b084:473e:8d93:3400]) by EDCP-XHG-HCP02.hub.local ([::1]) with mapi id 14.03.0408.000; Fri, 30 Nov 2018 07:40:58 -0600 From: "Chisholm, Rick" To: "freebsd-security@freebsd.org" Subject: OpenSSH CVE-2018-15473 Thread-Topic: OpenSSH CVE-2018-15473 Thread-Index: AdSIsdeScwzm2qYiRSyWjsw+rbG2+A== Date: Fri, 30 Nov 2018 13:40:58 +0000 Message-ID: <0054FFE9E041FC4EB2D50A99E26B120A9F8AB5@EDCV-XHG-TNP01.hub.local> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: yes X-MS-TNEF-Correlator: x-originating-ip: [10.130.30.9] MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-Office365-Filtering-HT: Tenant X-Forefront-Antispam-Report: CIP:64.14.237.30; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(39850400004)(396003)(376002)(136003)(346002)(2980300002)(199004)(189003)(54556002)(733005)(236005)(6306002)(55016002)(5640700003)(8676002)(5660300001)(6346003)(81156014)(26005)(186003)(81166006)(126002)(8936002)(476003)(478600001)(486006)(6116002)(790700001)(99936001)(3846002)(98436002)(33656002)(53936002)(54896002)(9686003)(2501003)(336012)(45080400002)(2351001)(6916009)(316002)(7736002)(2906002)(16586007)(105596002)(67866002)(101616003)(66926002)(106466001)(55846006)(102836004)(33896004)(84326002)(97736004)(861006)(7696005)(33964004)(86362001)(356004)(71190400001)(14444005)(5024004)(68736007)(606006); DIR:OUT; SFP:1102; SCL:1; SRVR:CY4PR0601MB3745; H:EDCV-XHG-MCP01.hub.local; FPR:; SPF:SoftFail; LANG:en; PTR:InfoDomainNonexistent; A:1; MX:1; X-Microsoft-Exchange-Diagnostics: 1; BL2NAM02FT046; 1:Vg9uMHAhz3miNpuLswcVNETkSKwxlmUSC3wlAP0YKhDU4abHGd+z/BKMxdEKspF7i6pWv41iRvdvbDKu0QkgVXf4xsCwfNivUWJHa12vlphna8Zxh5GgIeuEBGSzC+ru X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: f119effa-2143-439e-b964-08d656c979ab X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(2390098)(7020095)(4652040)(8989299)(5600074)(711020)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7153060)(49563074)(7193020); SRVR:CY4PR0601MB3745; X-Microsoft-Exchange-Diagnostics: 1; CY4PR0601MB3745; 3:xgdr8v+ribxjCUEzh0XQwzERiJRK7BFVxKhVocd4kWB75SpcXOeL1Qcb6n3XAUJ0EkfuaDUksYDt5extBHZDzIqDSvkBZZSthLndKOb8BIDkU659D1zM6lKhfjDoKeN0BTlkxn186X3dwPrgH40/CLBP77pKtPMIR0k2msrNe5Nof9nEO+JaX1r1MxHvMgfdyo3P83xG7RYMwAnmVBpRrD+6qiWiSaTGqD102RjqOyi/S9tD6IvtI71EclSUHb2EeZPh0+i0lRbm6PeBM6o+1gANZt/IvlCuKSeoXuVGqKKAFrsItom37dGS00thOHs1igcuxQGi0rn8wLe2Z0KjlEQ+qXxJ57qJvhcUtjL+7lE=; 25:lbtIlVRo7MXNGXJk+g/athYVC6/EZl0V2pElDG7Ry97hwZfxnn52LbUDpJuPNzuAj6DeItmlMIE2ADyg37xbYTNnN+D9OKBNFrYRvEDz5w9J2Dmd0CUwcxKdsqlVD9RzDjT6D1OZ76akMHSbwrdVVSKgWNZuU5cC/eYZzOYunarDnvrYNJXSpFXOuFG+TbY1Q1ctPHL/PbNZyiRUYBC0lU7OwWDHNJznoCi513q2lauRUruk5EvTOZ4OtxgfzBts2V1zo4/9AkgCExYoYTo18wvbWsxEuovacApfTt+GmTaSSVstR7SMTx4Cq2SySLxbKOJ9/epz51QkimZDYdSTeg== X-MS-TrafficTypeDiagnostic: CY4PR0601MB3745: X-Microsoft-Exchange-Diagnostics: 1; CY4PR0601MB3745; 31:XStmDtpGRHRvtpZGEyS3PNJR/039U+n4lID8cXcSbP6AIGhED9F1T7SUovHpBSi6kff/xm4nXFGikrClUsmjTR+44HM8bkS1UvW1MMloVAGtWsUKsCRmNLwCohW6tuS1sZ5TCOCK5YLXiUk9fNzb5DDqSH9towcmhy/+NXAEgYzib2VgFf2+C11yssB12MFYpOefWkOnW4xaMn2q1iVlPWWAzI11+VFsZT8QsyIvydE=; 20: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 X-Microsoft-Antispam-PRVS: X-MS-Exchange-SenderADCheck: 1 X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(102415395)(6040522)(2401047)(8121501046)(5005006)(3231453)(999002)(944501466)(4983020)(4982022)(52105112)(10201501046)(93006095)(93003095)(3002001)(6055026)(148016)(149066)(150057)(6041310)(20161123558120)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123560045)(201708071742011)(7699051)(76991095); SRVR:CY4PR0601MB3745; BCL:0; PCL:0; RULEID:; SRVR:CY4PR0601MB3745; X-Microsoft-Exchange-Diagnostics: 1; CY4PR0601MB3745; 4:ENvdC6oU+55sMey+kQ6ZkYUnNhUSdafqQ+oP3uzX46QXxj0xfa6LS5MxMnpeeM/8b8lzZW8rIHsrwFvnj4tYYC5racez3WHr3O8b8F+T8Ad95Yj6+PEQ3EDwVlPG0NTjjazRl+1yEj9K08z8K7cvxoTfasAVwy4+4xYSCPjvSAbivzU/h0AFm5uxVQ6oqvT+850KHzA2JaqbKVSkf6QliCmrSZYxqjM12yLZQtYVN9GmJJi/lIBPMF7lxtaZBEzpQHJ9ZPADfi4LfHVjvT3/Pg== X-Forefront-PRVS: 087223B4DA X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; CY4PR0601MB3745; 23:3Jv74E8Lsy1MWloZTrdK55beeAaXK0Prd5Zym8v?= =?us-ascii?Q?T4vmUgl2JVQbHwH8mCFzoj66gvo66WEvBW3es+7Xlw+ozWTqi+Xiq97V6klw?= =?us-ascii?Q?mVNZ44x9uBImBDySaIVLoU2umVrXF4bp8o9L/y/h8fdBE421TcFt5cB83oXF?= =?us-ascii?Q?JW+OLkfcml0sdgpIRLWVWv/bMyQp1H3uDS0eEK1xs9H97nI1c9CuS8/HZSiX?= =?us-ascii?Q?PCah7hAlB0iWVZqu86DyOd838ftomoqMVE7SgTRjCP2ZFurud2o1k7P0tjxP?= =?us-ascii?Q?yl7FqqUTPKx5JCohKrf/x51UbzWrxEI0EQEBAd4Z35+CLvCtbYSo021NW8iL?= =?us-ascii?Q?/rVprOG4QMoAJiVgp6icn0wvA1gqUnAkmlfaw1s/PSw2lDxfg+TOtxIAMGta?= =?us-ascii?Q?PIYhPXT3O/Y5oM4HdZcLrTjH3hKsi6qEjenDh+lMfSjZpmbWIoyjk2jnGZIO?= =?us-ascii?Q?5v0Booq+hOzfNoS8CP7L/hrEErvx8o0ujudQQaOpQmplKpFxKcl5m1TBFeey?= =?us-ascii?Q?8Xx/ljCoPyGNv1MtdZEhJoJRYI78/vdNqT1U8w8bNYH12FFXb7jpU5/uh0+i?= =?us-ascii?Q?23j6+snKJ/g0o6YB9AahHoK3Hs9yOJABzrffVXzwwNsrUKcAdL7NLWomF1l7?= =?us-ascii?Q?0eIoeqQRnHBEKzeU5QWrffmrQpSYH6Acuoa8GHMTUHk4wELBh1/sjWu+1+sR?= =?us-ascii?Q?l9mMB3zv1B/pp+E53KZst/JdIP/9/AfUUV+FbMjiWTriNAINQBXN8r5SJg4I?= =?us-ascii?Q?0QynX73u/K69wgFx20O7Nc6GIMtaVccWOFs3pSUvGE2eVxp3HAeGRiXchSIc?= =?us-ascii?Q?lNcvlvY2M4fIoYyRDoLJnSlOTkwPPrLU/LkY2dJFpU427K3XmW/9OspAVwTr?= =?us-ascii?Q?uciNool50oZntkyOCBPFgG0yte3fcHzBsNFAwyhkfhkKFZ6XwxuR56xSVSbB?= =?us-ascii?Q?jKt4oMS3t6+XaPAM5z0A1BRGp1JNSZH5n63yf1vOcODaMea8m4gNgh2e1NER?= =?us-ascii?Q?TYvLoUKFhk5J2SG/8VNuyiVfEE+4CRjQM3gfTj76dIw652WwvZqP92HyeJYI?= =?us-ascii?Q?i1NBl8XN5yF+BHTdWP+KSqdGaWjpFB51qWcb3y6uev4fF+HduPvbQhubVVaA?= =?us-ascii?Q?K0s5lvQclAbQaRcMjHwaNEx5xsSQ7Kykl83eePJvKBwsfZNXEdUETDJG7rWM?= =?us-ascii?Q?UFW6Gp65dKLxcZUBy7NQ8LoirhI+nF/0VJCB86wByeUgfDMlrvIBX9nu3ehD?= =?us-ascii?Q?OnSu1gRc8Kl3FvlvMiCis/7gwBkjdOuaa3X5ybl9OuEF7yGBPiXLH3pW9g3p?= =?us-ascii?Q?46iZF1kChwMQws+vDdPRX2STTXmLwoZaxl9bovu+2G0yBwrlCR4HmU6/pduF?= =?us-ascii?Q?ovhDMJ4JCrTnNKFF+gFGpvdCyAHevM3zaMcIQ9xua8rxb4CME?= X-Microsoft-Antispam-Message-Info: Kw6SDAIO33KXy6JGniZjWHYi84G0YtkGYmHakSvHzGH0LSz7wWNaJ+pn0/HZNqT6N5YCgjs+p/R+tUpjyGSkiyOZAPyWbI67yKdyoTBe/ZHesVkbMArs6AmBqvAWDq1zu2vimvqL0/MtU8/xGR6nCMBMgijYu5XDxP861k5JCFG+9vxVHoRi6oJBGKws6AQEJDDlC1E06IMcboTldcOPdIuwjkeVXmhI5l5FVv1ljQlhrAUfGlJTzpfr5ZnrCDoDq7UqlgbWr/V5HXjgRAvzk5TcTTmsgKZAk+/8qs3SMn8KaV/yM/g/mCFASDrnMsu7SYV8F8XJxJYClC0zSG+9tT9Rb/Za+Y3No5z17tyRls4= X-Microsoft-Exchange-Diagnostics: 1; CY4PR0601MB3745; 6:pw0wDnaeNFe8KD5yJxZPUfa9ivms7uNMqlSjJNLSgl/mVqCsvoW8t+1U4G5HmnwGd08m2nOGaisctOEdMW+r3++WsffUbAaPiFw9tVArZid87HOfSixOyv4tDJ3woCbT47sk/79saq0L4PQu3J4j6pRNPBp/DA51Q6eakKMWvtPxBbIWa2ebRZ+wrdu+2b3eMj4d6Nn6e5fZa5pnbcByY3rktd7zHuVmnwegrbpRKnxAvFYAJRMLISbufp5WNKAR5WfB/x++QXZtqL98IW1ZwYHppuwTKSe/Zw2z+IxDHpevtzPGiQ/KCpSnYkPIEqZpWITyaoTYG94pq88u/7rDbCpl1577KuiPNcYTGQ6GFDkjhB3FxTPZv0Jqm12Aamz47Jm4gFGUONC1oAbyh1C1/i1usrLRh5JUkigGq6JeQTdPCW1hGils4oQ4cyQnj6qvxfRB5SPzYF0/TpOwHaTUpA==; 5:SJBR9v9btqAcreLSUHcRdJRGi0RgR0QFP2YCWKtKZ7f6AQ2tqZfD8vjWfqZA2X5S1vc3g1WCoblwYfXW5Z55dxpTWyW9kI6kt7xEkad+yD+ItYZwuCwrFpRe96sVgM/ZpIeyJMa3ydGBcMDuykLtKBt26UUZg72FQfI3nRMsfeQ=; 7:Q1TybWfPzAXlYMHxBLYVR147fi/Sc9+5zYKottL/FBZa8lNS33mkxM2HeHYQeky/dfz6F2v+7z1t1qrNvqUOMOGaxNZdharZU8+ZZbEBOVqSv4+1/Hfen72caURbNcK/hotEhjsaYX4o/iPFzc+6DA== SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; CY4PR0601MB3745; 20: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 X-OriginatorOrg: hubinternational.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Nov 2018 13:41:04.7966 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: f119effa-2143-439e-b964-08d656c979ab X-MS-Exchange-CrossTenant-Id: a18515c2-3198-4fad-97ed-29a46c974fdb X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=a18515c2-3198-4fad-97ed-29a46c974fdb; Ip=[64.14.237.30]; Helo=[EDCV-XHG-MCP01.hub.local] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR0601MB3745 X-MC-Unique: AMSrFIIfMxq7MFielJmeEg-1 X-Rspamd-Queue-Id: 009B882B9A X-Spamd-Result: default: False [-2.17 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[hubinternational.com]; HAS_XOIP(0.00)[]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:63.128.21.0/24]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[multipart/related,multipart/alternative,text/plain]; IP_SCORE(-0.96)[ipnet: 63.128.21.0/24(-2.60), asn: 30031(-2.13), country: US(-0.09)]; RCVD_DKIM_ARC_DNSWL_MED(-0.50)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-0.05)[-0.055,0]; MANY_INVISIBLE_PARTS(0.50)[6]; NEURAL_SPAM_SHORT(0.96)[0.963,0]; RCVD_IN_DNSWL_MED(-0.20)[103.21.128.63.list.dnswl.org : 127.0.3.2]; DKIM_TRACE(0.00)[hubinternational.com:+]; MIME_BASE64_TEXT(0.10)[]; MX_GOOD(-0.01)[us-smtp-inbound-1.mimecast.com, us-smtp-inbound-2.mimecast.com, us-smtp-inbound-1.mimecast.com, us-smtp-inbound-2.mimecast.com, us-smtp-inbound-1.mimecast.com, us-smtp-inbound-2.mimecast.com, us-smtp-inbound-1.mimecast.com, us-smtp-inbound-2.mimecast.com, us-smtp-inbound-1.mimecast.com, us-smtp-inbound-2.mimecast.com, us-smtp-inbound-1.mimecast.com, us-smtp-inbound-2.mimecast.com, us-smtp-inbound-1.mimecast.com, us-smtp-inbound-2.mimecast.com, us-smtp-inbound-1.mimecast.com, us-smtp-inbound-2.mimecast.com, us-smtp-inbound-1.mimecast.com, us-smtp-inbound-2.mimecast.com, us-smtp-inbound-1.mimecast.com, us-smtp-inbound-2.mimecast.com, us-smtp-inbound-1.mimecast.com, us-smtp-inbound-2.mimecast.com, us-smtp-inbound-1.mimecast.com, us-smtp-inbound-2.mimecast.com, us-smtp-inbound-1.mimecast.com, us-smtp-inbound-2.mimecast.com, us-smtp-inbound-1.mimecast.com, us-smtp-inbound-2.mimecast.com, us-smtp-inbound-1.mimecast.com, us-smtp-inbound-2.mimecast.com, us-smtp-inbound-1.mimecast.com, us-smtp-inbound-2.mi mecast.com,us-smtp-inbound-1.mimecast.com,us-smtp-inbound-2.mimecast.com,us-smtp-inbound-1.mimecast.com,us-smtp-inbound-2.mimecast.com,us-smtp-inbound-1.mimecast.com,us-smtp-inbound-2.mimecast.com,us-smtp-inbound-1.mimecast.com,us-smtp-inbound-2.mimecast.com,us-smtp-inbound-1.mimecast.com,us-smtp-inbound-2.mimecast.com,us-smtp-inbound-1.mimecast.com,us-smtp-inbound-2.mimecast.com,us-smtp-inbound-1.mimecast.com,us-smtp-inbound-2.mimecast.com,us-smtp-inbound-1.mimecast.com,us-smtp-inbound-2.mimecast.com,us-smtp-inbound-1.mimecast.com,us-smtp-inbound-2.mimecast.com,us-smtp-inbound-1.mimecast.com,us-smtp-inbound-2.mimecast.com,us-smtp-inbound-1.mimecast.com,us-smtp-inbound-2.mimecast.com,us-smtp-inbound-1.mimecast.com,us-smtp-inbound-2.mimecast.com]; TO_DN_EQ_ADDR_ALL(0.00)[]; DMARC_POLICY_ALLOW(-0.50)[hubinternational.com,none]; RWL_MAILSPIKE_POSSIBLE(0.00)[103.21.128.63.rep.mailspike.net : 127.0.0.17]; FROM_EQ_ENVFROM(0.00)[]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:30031, ipnet:63.128.21.0/24, country:US]; RCVD_COUNT_SEVEN(0.00)[8] X-Rspamd-Server: mx1.freebsd.org Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: base64 X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Nov 2018 13:41:20 -0000 V29uZGVyaW5nIHdoYXQgdGhlIEZyZWVCU0Qgc2VjdXJpdHkgdGVhbeKAmXMgcG9zaXRpb24gaXMg b24gdGhpcyBwYXJ0aWN1bGFyIGlzc3VlLiBUaGVyZSBkb2VzbuKAmXQgc2VlbSB0byBiZSBhIHJ1 c2ggdG8gYWRkcmVzcyBpdCwgc29tZSB2ZW5kb3JzIGhhdmUsIG90aGVycyBoYXZlIG5vdC4gQW55 IGludGVudGlvbnMgdG8gYmFja3BvcnQgdGhlIHBhdGNoIG9yIGFkb3B0IHRoZSBsYXRlc3Qgb3Bl bnNzaCB2ZXJzaW9uPw0KDQpbSFVCIEludGVybmF0aW9uYWxdPGh0dHA6Ly93d3cuaHViaW50ZXJu YXRpb25hbC5jb20vPg0KDQpbaHR0cHM6Ly9zMy5hbWF6b25hd3MuY29tL2h1Yi1zaWduYXR1cmUt Z2VuZXJhdG9yL2h1Yi10YWdsaW5lLnBuZ10NCg0KUmljayBDaGlzaG9sbQ0KSVQgU2VjdXJpdHkg T2ZmaWNlciwgSFVCIEN1c3RvbWVyIENlbnRyYWwgKEhDQykNCg0KSFVCIEludGVybmF0aW9uYWwN CjM2MDAg4oCLUmhvZGVzIOKAi0RyaXZlDQpXaW5kc29yLOKAi09OIOKAi044VyA1QTQNCg0KT2Zm aWNlOiA1MTkt4oCLOTQ1LTQ5NDMgZXh0LiA0NDQ0DQpUb2xsLWZyZWU6IDgwMC3igIszOTYtMTk4 Ng0KRmF4OiA1MTkt4oCLOTc0LTcyOTANCnJpY2suY2hpc2hvbG1AaHViaW50ZXJuYXRpb25hbC5j b208bWFpbHRvOnJpY2suY2hpc2hvbG1AaHViaW50ZXJuYXRpb25hbC5jb20+DQpodWJpbnRlcm5h dGlvbmFsLmNvbTxodHRwOi8vd3d3Lmh1YmludGVybmF0aW9uYWwuY29tLz4NCg0KW0ZhY2Vib29r XTxodHRwczovL3d3dy5mYWNlYm9vay5jb20vSFVCSW50ZXJuYXRpb25hbExpbWl0ZWQ+W0xpbmtl ZEluXTxodHRwczovL3d3dy5saW5rZWRpbi5jb20vY29tcGFueS9odWItaW50ZXJuYXRpb25hbD5b VHdpdHRlcl08aHR0cHM6Ly90d2l0dGVyLmNvbS9IVUJJbnN1cmFuY2U+DQoNCkNvbmZpZGVudGlh bGl0eSBOb3RpY2U6IFRoaXMgZWxlY3Ryb25pYyBtZXNzYWdlLCB0b2dldGhlciB3aXRoIGl0cyBh dHRhY2htZW50cywgaWYgYW55LCBpcyBpbnRlbmRlZCB0byBiZSB2aWV3ZWQgb25seSBieSB0aGUg aW5kaXZpZHVhbCB0byB3aG9tIGl0IGlzIGFkZHJlc3NlZC4gSXQgbWF5IGNvbnRhaW4gaW5mb3Jt YXRpb24gdGhhdCBpcyBwcml2aWxlZ2VkLCBjb25maWRlbnRpYWwsIHByb3RlY3RlZCBoZWFsdGgg aW5mb3JtYXRpb24gYW5kL29yIGV4ZW1wdCBmcm9tIGRpc2Nsb3N1cmUgdW5kZXIgYXBwbGljYWJs ZSBsYXcuIEFueSBkaXNzZW1pbmF0aW9uLCBkaXN0cmlidXRpb24gb3IgY29weWluZyBvZiB0aGlz IGNvbW11bmljYXRpb24gaXMgc3RyaWN0bHkgcHJvaGliaXRlZCB3aXRob3V0IG91ciBwcmlvciBw ZXJtaXNzaW9uLiBJZiB0aGUgcmVhZGVyIG9mIHRoaXMgbWVzc2FnZSBpcyBub3QgdGhlIGludGVu ZGVkIHJlY2lwaWVudCBvciBpZiB5b3UgaGF2ZSByZWNlaXZlZCB0aGlzIGNvbW11bmljYXRpb24g aW4gZXJyb3IsIHBsZWFzZSBub3RpZnkgdXMgaW1tZWRpYXRlbHkgYnkgcmV0dXJuIGUtbWFpbCBh bmQgZGVsZXRlIHRoZSBvcmlnaW5hbCBtZXNzYWdlIGFuZCBhbnkgY29waWVzIG9mIGl0IGZyb20g eW91ciBjb21wdXRlciBzeXN0ZW0uDQoNCg== From owner-freebsd-security@freebsd.org Fri Nov 30 23:47:17 2018 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9DC3D11533AD for ; Fri, 30 Nov 2018 23:47:17 +0000 (UTC) (envelope-from marquis@roble.com) Received: from mx5.roble.com (mx5.roble.com [209.237.23.5]) (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits)) (Client CN "mx5.roble.com", Issuer "mx5.roble.com" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 932CC7C9D8 for ; Fri, 30 Nov 2018 23:47:16 +0000 (UTC) (envelope-from marquis@roble.com) Received: from roble.com (roble.com [209.237.23.50]) by mx5.roble.com (Postfix) with ESMTP id AB23A15C32 for ; Fri, 30 Nov 2018 15:47:07 -0800 (PST) Date: Fri, 30 Nov 2018 15:47:07 -0800 (PST) From: Roger Marquis To: freebsd-security@freebsd.org Subject: Re: Interim support guarantee for FreeBSD 12 Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed X-Rspamd-Queue-Id: 932CC7C9D8 X-Spamd-Result: default: False [4.15 / 15.00]; TO_DN_NONE(0.00)[]; MX_GOOD(-0.01)[mx4.roble.com,mx7.roble.com]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:17403, ipnet:209.237.0.0/18, country:US]; IP_SCORE(-0.02)[country: US(-0.09)]; ARC_NA(0.00)[]; FAKE_REPLY(1.00)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_SPAM_SHORT(0.70)[0.699,0]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-security@freebsd.org]; DMARC_NA(0.00)[roble.com]; AUTH_NA(1.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_SPAM_MEDIUM(0.72)[0.719,0]; NEURAL_SPAM_LONG(0.87)[0.865,0]; R_SPF_NA(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-Rspamd-Server: mx1.freebsd.org X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Nov 2018 23:47:17 -0000 FYI re potential cuts to STABLE long-term support. Does this affect the RELEASE branch as well? Anyone know where this is being discussed? The announcement mentions community feedback but that seems unlikely given there has been no mention of it on the freebsd-security list. Roger Marquis >Date: Wed, 28 Nov 2018 11:04:48 -0400 >From: FreeBSD Core Team Secretary >To: freebsd-announce@freebsd.org >Subject: [FreeBSD-Announce] Interim support guarantee for FreeBSD 12 > >Dear FreeBSD community, > >The Core Team, in consultation with Release Engineering, the Security >Team, and Port Manager has decided that we need to reevaluate the 5-year >support of stable branches starting with stable/12. A changed security >landscape, increased toolchain velocity, and shorter support windows for >our upstream components necessitate this reevaluation. > >We will be leading discussions on updating our support model, with the >goal of making the model sustainable for the Project. These >discussions, which will include opportunities for community feedback, >will be complete by March 31, 2019. > >Regardless of the outcome of the discussions, we guarantee support for >the stable/12 branch for at least 18 months, or at least 6 months after >13.0 is released, whichever is later. Again, these are minimum >durations for the stable/12 branch support and they will not be reduced. > >After these discussions are complete, there will be a revised statement >about the stable/12 branch lifetime. > >Release Engineering, the Security Team, Port Manager, and the Core Team From owner-freebsd-security@freebsd.org Fri Nov 30 23:53:25 2018 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 1DD25115384E for ; Fri, 30 Nov 2018 23:53:25 +0000 (UTC) (envelope-from brooks@spindle.one-eyed-alien.net) Received: from spindle.one-eyed-alien.net (spindle.one-eyed-alien.net [199.48.129.229]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 856CC7D26A for ; Fri, 30 Nov 2018 23:53:24 +0000 (UTC) (envelope-from brooks@spindle.one-eyed-alien.net) Received: by spindle.one-eyed-alien.net (Postfix, from userid 3001) id 735943C475F; Fri, 30 Nov 2018 23:53:23 +0000 (UTC) Date: Fri, 30 Nov 2018 23:53:23 +0000 From: Brooks Davis To: Roger Marquis Cc: freebsd-security@freebsd.org Subject: Re: Interim support guarantee for FreeBSD 12 Message-ID: <20181130235323.GA20608@spindle.one-eyed-alien.net> References: MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="TB36FDmn/VVEgNH/" Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) X-Rspamd-Queue-Id: 856CC7D26A X-Spamd-Result: default: False [-7.56 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; DMARC_NA(0.00)[freebsd.org]; AUTH_NA(1.00)[]; TO_MATCH_ENVRCPT_SOME(0.00)[]; MX_GOOD(-0.01)[cached: spindle.one-eyed-alien.net]; RCPT_COUNT_TWO(0.00)[2]; NEURAL_HAM_SHORT(-0.99)[-0.994,0]; R_SPF_NA(0.00)[]; SIGNED_PGP(-2.00)[]; FORGED_SENDER(0.30)[brooks@freebsd.org,brooks@spindle.one-eyed-alien.net]; R_DKIM_NA(0.00)[]; RCVD_TLS_LAST(0.00)[]; ASN(0.00)[asn:36236, ipnet:199.48.128.0/22, country:US]; FROM_NEQ_ENVFROM(0.00)[brooks@freebsd.org,brooks@spindle.one-eyed-alien.net]; IP_SCORE(-3.66)[ip: (-9.51), ipnet: 199.48.128.0/22(-4.76), asn: 36236(-3.92), country: US(-0.09)]; RCVD_COUNT_TWO(0.00)[2] X-Rspamd-Server: mx1.freebsd.org X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Nov 2018 23:53:25 -0000 --TB36FDmn/VVEgNH/ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable It concerns all produces created from the STABLE branch include releases. We're aiming to begin discussions starting around the first of the year. -- Brooks On Fri, Nov 30, 2018 at 03:47:07PM -0800, Roger Marquis wrote: > FYI re potential cuts to STABLE long-term support. Does this affect the > RELEASE branch as well? Anyone know where this is being discussed? The > announcement mentions community feedback but that seems unlikely given > there has been no mention of it on the freebsd-security list. >=20 > Roger Marquis >=20 >=20 > >Date: Wed, 28 Nov 2018 11:04:48 -0400 > >From: FreeBSD Core Team Secretary > >To: freebsd-announce@freebsd.org > >Subject: [FreeBSD-Announce] Interim support guarantee for FreeBSD 12 > > > >Dear FreeBSD community, > > > >The Core Team, in consultation with Release Engineering, the Security > >Team, and Port Manager has decided that we need to reevaluate the 5-year > >support of stable branches starting with stable/12. A changed security > >landscape, increased toolchain velocity, and shorter support windows for > >our upstream components necessitate this reevaluation. > > > >We will be leading discussions on updating our support model, with the > >goal of making the model sustainable for the Project. These > >discussions, which will include opportunities for community feedback, > >will be complete by March 31, 2019. > > > >Regardless of the outcome of the discussions, we guarantee support for > >the stable/12 branch for at least 18 months, or at least 6 months after > >13.0 is released, whichever is later. Again, these are minimum > >durations for the stable/12 branch support and they will not be reduced. > > > >After these discussions are complete, there will be a revised statement > >about the stable/12 branch lifetime. > > > >Release Engineering, the Security Team, Port Manager, and the Core Team > _______________________________________________ > freebsd-security@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-security > To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.or= g" >=20 --TB36FDmn/VVEgNH/ Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEcBAEBAgAGBQJcAc1yAAoJEKzQXbSebgfAKI8H/1zPX6v5uXqCKG8GJU5An83y fdpfgLLZ0FneXD/OMUpmfDEhql3r61igOGf6oujNodaftzucoQ2I6SAZG9Yh2UYF UDpY6U++CMNDkXjy7xnwM5YXlVjLO+PPgs7fHEoMjj/yfsFkxRgNTl9jV3o0vre7 QiKYYrlKZ89O0o/tIjmHSMDyc3rp/IO4wYeI9WlmNcKHb+oBlMjyfazVR+7v3M6D 083ErRux6EsApxUcTfATqkmVWJ3ST3XFhkZHDh2PJEfb4Di4VCvKFrWkCC9yd/2V jO6nZmbiPB9pBV79SPV0ARlJEh/fT5R+7EqPdPPn4K6GYv6fp7mz0AbMVwL85Sw= =B45r -----END PGP SIGNATURE----- --TB36FDmn/VVEgNH/--